Overview
Join us for one day of discussions about the hot topics in eDiscovery and information governance. You’ll come away with a better understanding of current trends, best practices and emerging technologies.
Join us for one day of discussions about the hot topics in eDiscovery and information governance. You’ll come away with a better understanding of current trends, best practices and emerging technologies.
Our Retreat is an informative and interactive gathering of corporate executives, in-house lawyers, outside counsel, judges, thought leaders, and top-rated eDiscovery & information governance service and technology vendors. While there is widespread agreement that information governance is important and necessary, there is far less agreement as to how an effective and legally defensible information governance program should be designed and implemented.
Our panel discussions, “war stories” and lessons learned will explore what companies are doing to organize and create policies specifying how their information – primarily electronic information – is created, stored, used, archived and deleted. We will look at the processes companies are using to maximize the use of their information, the debate as to which stakeholders should be involved in these processes, and whether adequate standards exist or need to be created in this area. The panels will also examine the interaction between legal issues and information governance efforts, including the effect of litigation holds, pending litigation, regulatory requirements and fear of discovery sanctions.
Whether you are new to the eDiscovery and information governance industry and seeking more information or want to increase your existing expertise, our Retreats will allow you to explore the latest issues and strategies with knowledgeable and experienced consultants, technologists, lawyers, thought leaders and your peers – all in one of California’s most beautiful places to visit: Carmel Valley
With a full agenda of educational sessions, scheduled networking events, and family-friendly locations, you won’t want to miss out on the opportunity to learn about these key issues in this relaxed setting. We invite you to explore our website, contact us with questions, and join us at this upcoming Retreat – where questions are answered at unquestionably scenic locations.
Please note: significant others may join
Opinions about best practices for using Technology-Assisted Review have evolved. The panel will consider both strategic and technical issues while discussing when and how you should use TAR. Expect some surprises and controversy.
Analysts estimate that over half of all network attacks leverage encryption. By using forged or compromised keys and certificates, attackers create malicious tunnels into your network where they hide while they conduct surveillance, install malware and ultimately exfiltrate valuable data. This type of attack is particularly nefarious because the tunnels that attackers use appear to contain everyday business communications, unless they are inspected. But let’s face it, how many organizations inspect 100% of their network traffic?
In traditional records management, lifecycles and policies are defined without regard to content value. And yet, we intuitively know that some documents and records inherently bring more value to your organization, and carry more cost or risk. Infonomics provides a model for defining and applying value, cost, and risk metrics to your content, and managing your content as information assets. In this session, we will introduce basic Infonomics principles, see how these are being applied today, and give a glimpse into the future of Inofonomics-based analytics.
9 out of 10 companies have been breached, 40% report they had 5 or more significant incidents this year, 5 million records are stolen every day. Equifax? Let’s agree, breaches happen. This interactive panel of security experts will discuss why breaches happen, why 100% security doesn’t exist, the investment trends to detection and incident response, and ultimately what has worked for them. Gartner, Inc. has recognized deception as the most efficient approach for detecting advanced threats and recommends this as a 2017 initiative. The panel will share their insights into how to use deception technology, its value, and how it changes the game on attackers.
How to manage your corporate chat, social media and websites in an age of increasingly stricter industry compliance regulations and legal risks.
Managing the substance of a high-stakes litigation can be a black box for corporate counsel. At its worst, updates from outside counsel may be incomplete, inconsistent, and leave corporate counsel feeling out of the loop. With corporate counsel increasingly taking a more active role in large litigation matters, and even in-sourcing or disaggregating parts of cases, it is critical to explore ways to collaborate. Corporate counsel rely on outside counsel to provide sufficient information to make cost-driving decisions as a case proceeds, and in deciding when and whether to settle. This panel explores pitfalls of current methods of coordination among members of legal teams, and new strategies and technologies for driving efficiency and ensuring that corporate counsel has adequate information to make the best decisions at every stage of a case.
The inadvertent disclosure of your client’s data can land you in the front page of the New York Times. While the Wells Fargo matter concerned English-only documents, this case underscores the importance of eDiscovery competence. Add to this non-English data, the risk increases.
In today's global economy, businesses operate within a complex web of legal, cultural and linguistic challenges. As data grows exponentially, large volumes of potentially relevant digital evidence will contain many different languages, often in a variety of media formats. The duty to accurately identify responsive and privilege data, no matter what language, are the same. Our panel will discuss how law firms can leverage specialized multi-language & cross-disciplinary review teams when designing a foreign language workflow, including the proper use of human translations and technology when dealing with mixed language data volumes.
Moderator: ,
Panelist:
Panelist:
Panelist:
Panelist:
Data breeches result in financial losses that far exceed the initial breech. The intention or inadvertent disclosure of your organizations sensitive and confidential data can damage your brand and result in multi-year legal liability claims. Employees are your competitive advantage, your greatest asset.They are also your biggest threat. An interactive discussion of the detection, prevention, monitoring and mitigation of Insider Threats against your organization's structured data.
While AI/Machine Learning systems are becoming more “intelligent” and ever-present in today’s products, our approach to interacting with these systems is in its infancy and we have a lot to learn. From production to discovery, litigation hold to forensics, the legal sector - with its complex processes and ever growing volumes of information - is well poised radical change.
While the results of AI systems are touted far and wide, less attention has been paid to the ways in which users should interact with the output, let alone the AI systems themselves. The value of such systems is directly correlated to the end-user and workflow product utility, as well as the underlying human-computer interaction dynamics.
We’ll discuss the status quo of AI in law, the origins of the limitations in today’s technology, and how to “invent the future.” We’ll look at how Merriam Tech solutions for large scale document review and management is opening the door for intelligent systems and bringing AI to the legal sector.
- New technologies that enable trade secret theft
- Best practices for managing new technologies
- New parties involved in trade secret theft
- Ensuring trade secrets remain trade secrets
EU data privacy laws including the recently adopted 2016 General Data Protection Regulation (GDPR) and the EU-U.S. Privacy Shield Framework will have a significant impact on how data exchange must happen between companies that provide goods and services to the EU and U.S. litigants needing data from EU member states. This session will explore the practical concerns and strategies that litigators and corporations should consider to comply with the changing and costly data privacy landscape by 2018.
The panel will explore how information governance policies can impact e-discovery costs and timing - what are the most significant IG factors that drive e-discovery challenges and what are you obligated to collect? The panel will cover how IG policies effect potential sources of ESI and the scope, breadth and depth of those sources. Topics discussed will include retention and archiving practices, local storage, ability to write to external media, text messages, use of social media, personal email accounts.